Font Size: a A A

Research And Implementation Of Trojan Horse Hiding Technology Based On P2P

Posted on:2017-12-22Degree:MasterType:Thesis
Country:ChinaCandidate:Y HeFull Text:PDF
GTID:2348330536476739Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the computer network,more and more people use the Internet to work and play.While enjoying the Internet service,the face of security threats have been growing.The rise of the Trojan virus and Botnet,reducing the user experience.Competition between countries has from the traditional hard power(land and sea)to now the soft power(finance,information),and The Trojan horse in which plays very important role.Attack and defense are opposite,the research of attack technology is in order to occupy the initiative in the defense.For a Trojan horse,there are two very important measure:One is the hidden of Trojan horse itself,and the other is how to prevent tracing,It means when the Trojan horse samples were captured,how to prevent the analysts to track the final source control.On the basis of studying the traditional Trojan horse technology,this paper combines the Trojan hidden technology with the popular P2P technology,and puts forward a P2P based control system.Based on the characteristic of P2P network itself which is complex and changeable,to have the traceability prevention effect,the main work includes:(1)Studying the Trojan hidden technology,to achieve the hidden of Trojan horse,including file hiding,module hiding,and port hiding.(2)Implementation of the Trojan horse control system based on P2P technology,as well as the application of the system of random routing algorithm,and the node load factor into account.(3)Implementation of non-uniform file segmentation algorithm to solve the problem of large file transfer in P2P network.(4)Study the principle of boundary firewall,and propose a multi-protocol approach to penetrate the firewall.
Keywords/Search Tags:Trojan horse, P2P, random routing, non-uniform file segmentation
PDF Full Text Request
Related items